idmap_ad — Samba's idmap_ad Backend for Winbind《转载》

Name

idmap_ad — Samba‘s idmap_ad Backend for Winbind

DESCRIPTION

The idmap_ad plugin provides a way for Winbind to read id mappings from an AD server that uses RFC2307/SFU schema extensions. This module implements only the "idmap" API, and is READONLY. Mappings must be provided in advance by the administrator by adding the uidNumber attributes for users and gidNumber attributes for groups in the AD. Winbind will only map users that have a uidNumber and whose primary group have a gidNumber attribute set. It is however recommended that all groups in use have gidNumber attributes assigned, otherwise they are not working.

Currently, the ad backend does not work as the the default idmap backend, but one has to configure it separately for each domain for which one wants to use it, using disjoint ranges. One usually needs to configure a writeable default idmap range, using for example the tdb or ldap backend, in order to be able to map the BUILTIN sids and possibly other trusted domains. The writeable default config is also needed in order to be able to create group mappings. This catch-all default idmap configuration should have a range that is disjoint from any explicitly configured domain with idmap backend ad. See the example below.

IDMAP OPTIONS

range = low - high

Defines the available matching UID and GID range for which the backend is authoritative. Note that the range acts as a filter. If specified any UID or GID stored in AD that fall outside the range is ignored and the corresponding map is discarded. It is intended as a way to avoid accidental UID/GID overlaps between local and remotely defined IDs.

schema_mode = <rfc2307 | sfu | sfu20>

Defines the schema that idmap_ad should use when querying Active Directory regarding user and group information. This can be either the RFC2307 schema support included in Windows 2003 R2 or the Service for Unix (SFU) schema. For SFU 3.0 or 3.5 please choose "sfu", for SFU 2.0 please choose "sfu20". Please note that primary group membership is currently always calculated via the "primaryGroupID" LDAP attribute.

EXAMPLES

The following example shows how to retrieve idmappings from our principal and trusted AD domains. If trusted domains are present id conflicts must be resolved beforehand, there is no guarantee on the order conflicting mappings would be resolved at this point. This example also shows how to leave a small non conflicting range for local id allocation that may be used in internal backends like BUILTIN.

	[global]
	workgroup = CORP

	idmap config * : backend = tdb
	idmap config * : range = 1000000-1999999

	idmap config CORP : backend  = ad
	idmap config CORP : range = 1000-999999
	

AUTHOR

The original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed.

《COPY FROM:http://www.samba.org/samba/docs/man/manpages/idmap_ad.8.html

idmap_ad — Samba's idmap_ad Backend for Winbind《转载》

时间: 2024-10-28 10:01:28

idmap_ad — Samba's idmap_ad Backend for Winbind《转载》的相关文章

将samba加入到windows域《转载》

将samba加入到windows域 那什么是域呢? 一台Windows计算机,它要么隶属于工作组,要么隶属于域.所以说到域,我们就不得不提一下工作组,工作组是MS的概念,一般的普遍称谓是对等网. 工作组(Work Group)就是将不同的电脑按功能分别列入不同的组中,以方便管理.比如在一个网络内,可能有成百上千台工作电脑,如果这些电脑不进行分组,都列在“网上邻居”内,可想而知会有多么乱. 与工作组有所不同,域(domain)是一个相对严格的组织,至少需要一台安装了windwos NT/2000/

samba服务器加入域控主机所需要修改的配置文件

samba服务器加入域控主机,成为域成员,当用户访问samba服务器上的共享文件时,直接到域控主机上进行认证.samba服务器上不需要像先前一样创建系统用户,创建samba用户及密码. 1.安装环境(host) SAMBA服务器:RHEL6.4      IP:192.168.1.101  主机名:sambaserver.samba.com 域控主机WINSERVER2008  IP:192.168.1.100  主机名:winserver.samba.com 域名:SAMBA.COM 设置SE

samba用户自行修改密码

最近一直在潜心研究linux shell,所以好久没有更新了.今天也是在QQ有人和我聊到samba密码ldap集中验证时,想到一个问题,内网使用samba服务器来存储用户数据,所有的用户不能登陆LINUX后台,如何让客户自行修改密码? 想要解决客户端实现修改samba密码,其实不需要去搭建ldap(维护成本较高),也不需要利用行政手法统计客户端密码(毕竟同事也不好意思告诉你他平时习惯用的密码),网上google了下,利用changepassword这个工具即可利用其WEB界面让普通用户登录WEB

samba域控配置文件nsswitch-krb5-smb.conf

#vi /etc/nsswitch.confpasswd: compat winbindgroup: compat winbindshadow: compat hosts: files dns winsnetworks: files dnsprotocols: db filesservices: db filesethers: db filesrpc: db files #vi /etc/krb5.conf[logging] default = FILE:/var/log/krb5libs.lo

samba服务日志文件-密码文件及启停

1.Samba服务日志文件日志文件对于samba非常重要,它存储着客户端访问samba服务器的信息,以及samba服务的错误提示信息等,可以通过分析日志,帮助解决客户端访问和服务器维护等问题.在/etc/samba/smb.conf文件中,logfile为设置samba日志的字段.#=======================GlobalSettings=====================================[global]#this tells Samba to use a

自动部署Samba共享脚本

基本的都有,需要使用的拿出来组合 匿名的 Samba共享的服务端软件为samba.客户端软件为samba-client yum -y install samba samba-client sed -i '/workgroup/s/MYGROUP/WORKGROUP/' /etc/samba/smb.conf #融入Windows网络的默认工作组WORKGROUP sed -i '/server string = Samba Server Version %v/s/Samba Server Ver

samba企业级实战应用详解-技术流ken

1.简介 Samba是一套使用SMB(Server Message Block)协议的应用程序, 通过支持这个协议, Samba允许Linux服务器与Windows系统之间进行通信,使跨平台的互访成为可能. 2.系统环境 系统版本:centos6.7 服务器IP: 10.220.5.166/24 3.关闭安全服务 [[email protected] ~]# service iptables stop [[email protected] ~]# setenforce 0 4. 安装samba

Linux连接Windows AD服务器配置

前提条件 目的 为了在Windows Active Directory上管理的用户也能在Linux服务器上使用. 注意:本文不包含AD服务器的搭建过程. 环境 AD服务器环境: Windows Server 2008 R2 全域名(FQDN)为: wins.example.com Linux服务器: Oracle Linux 6.4(64bit) 全域名(FQDN)为: demo.example.com 配置Linux服务器网络 首先请禁用 SELinux和iptables防火墙. 在HOST文

Samba通过ad域进行认证并限制空间大小《转载》

本文实现了samba服务被访问的时候通过windows域服务器进行用户名和密码验证;认证通过的用户可以自动分配500M的共享空间;在用户通过windows域登陆系统的时候可以自动把这块空间映射成一块硬盘.环境说明:文件服务器用的Centos5.3,域控用的Win2k3 sp2,Domain是rainbird.net.Centos5.3:Name:FilesrvIP:192.168.1.245Dns:192.168.1.241Samba:3.0.33-3.7.el5Win2k3:Name:ad1I